Blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment

M Vivekanandan, S VN, SR U - Peer-to-Peer Networking and Applications, 2021 - Springer
The development in cloud computing platforms has resulted, hosting many day-to-day
service applications in the cloud. To avail the services provided by different cloud service …

A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing

Y Zhang, L Xiong, F Li, X Niu, H Wu - Journal of Systems Architecture, 2023 - Elsevier
Blockchain-based authentication mode, a fundamental solution to prevent unauthorized
access behavior, gradually becomes a focus in future distributed mobile cloud computing …

A blockchain-based authentication and authorization scheme for distributed mobile cloud computing services

L Yu, M He, H Liang, L Xiong, Y Liu - Sensors, 2023 - mdpi.com
Authentication and authorization constitute the essential security component, access control,
for preventing unauthorized access to cloud services in mobile cloud computing (MCC) …

A privacy-aware authentication scheme for distributed mobile cloud computing services

JL Tsai, NW Lo - IEEE systems journal, 2015 - ieeexplore.ieee.org
In modern societies, the number of mobile users has dramatically risen in recent years. In
this paper, an efficient authentication scheme for distributed mobile cloud computing …

An efficient and provably secure anonymous user authentication and key agreement for mobile cloud computing

J Mo, Z Hu, H Chen, W Shen - Wireless Communications and …, 2019 - Wiley Online Library
Nowadays, due to the rapid development and wide deployment of handheld mobile devices,
the mobile users begin to save their resources, access services, and run applications that …

A2UA: An auditable anonymous user authentication protocol based on blockchain for cloud services

Q Lyu, H Li, Z Deng, J Wang, Y Ren… - … on Cloud Computing, 2022 - ieeexplore.ieee.org
Regulating illegal activities in cyberspace to balance user privacy and cyberspace
governance has been a non-trivial challenge when designing anonymous authentication …

Blockchain-based authentication protocol design from a cloud computing perspective

Z Du, W Jiang, C Tian, X Rong, Y She - Electronics, 2023 - mdpi.com
Cloud computing is a disruptive technology that has transformed the way people access and
utilize computing resources. Due to the diversity of services and complexity of environments …

A more secure and privacy‐aware anonymous user authentication scheme for distributed mobile cloud computing environments

R Amin, SKH Islam, GP Biswas, D Giri… - Security and …, 2016 - Wiley Online Library
Now‐a‐days, the low‐power handheld mobile devices make our life more comfortable. With
the fast advancement of mobile communication technologies and Internet, mobile users are …

[PDF][PDF] A lightweight authentication scheme for mobile cloud computing

MR Momeni - International Journal of Computer Science and …, 2014 - academia.edu
The ABI Research believes that the number of mobile cloud computing users is expected to
grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total …

An enhanced privacy-aware authentication scheme for distributed mobile cloud computing services

L Xiong, D Peng, T Peng, H Liang - KSII Transactions on Internet …, 2017 - koreascience.kr
With the fast growth of mobile services, Mobile Cloud Computing (MCC) has gained a great
deal of attention from researchers in the academic and industrial field. User authentication …